The ransomware gang known as Clop has been observed exploiting a pre-authentication command injection vulnerability (CVE-2023-0669)…
Author: admin
Attacks Targeting APIs Increased By 400% in Last Six Months
Attacks targeting application programming interfaces (APIs) have increased 400% in the last six months. The findings…
Tech Industry Bids to Tackle Cyber-Mercenary Epidemic
Some of the biggest names in the IT industry have released a new set of principles…
Okta Unveils Redesigned Channel Program To Better Reward Services Partners, Integrators
Okta has overhauled its channel program to recognize and incentivize partners for contributing value in numerous…
3CX Supply Chain Attack: 8 Biggest Things To Know
Potentially ‘Massive’ Attack The supply chain compromise of a widely used VoIP phone system vendor, 3CX,…
Many Customers May Reassess Using 3CX After Supply Chain Breach: Expert
All customers that use 3CX’s phone system ‘will and should engage in a new risk assessment…
Hackers May Still Have Access To 3CX Supply Chain: Huntress Researcher
It’s possible the hackers behind a potentially far-reaching supply chain attack on 3CX and its customers…
Security Challenges: 5 Midmarket IT Leaders On Where They Need Help
When it comes to staving off the plethora of security risks facing businesses today, midmarket companies…
Gartner VP: These Are The Security Trends To Watch In 2023
“Business thinks IT has a crystal ball, but the truth is the CISO doesn’t always know…
ESET Remains ‘Fully Committed’ To On-Prem Security Deployments: Executive
The cybersecurity firm won’t be following other endpoint security vendors in shifting to a cloud-first or…